Strategic Authoritarian Narratives in the Sahel
In recent years, countries in the Sahel region of Africa have faced widespread insecurity and instability. Stretching across the northern tier of sub-Saharan Africa, Sahel countries Niger, Mali, and Burkina Faso have all experienced a series of military coups and rising levels of right-wing extremism. Poverty, environmental degradation, and competition for scarce resources like uranium, have further exacerbated this situation, creating a volatile mix of factors that have fueled social unrest and enabled the expansion of terrorist groups operating in these countries.
Technical infrastructure as a hidden terrain of disinformation
While social media disinformation has received significant academic and policy attention, more consequential forms of intentional manipulation target the underlying digital infrastructures upon which society depends. Infrastructure-based deception, less visible than deception targeting content and platforms, has consequences for internet security, stability and trust. This article examines terrains of disinformation in digital infrastructure, including in the Domain Name System, access and interconnection, public key infrastructures, cyber-physical systems and emerging technologies. Infrastructure disinformation is largely a cybersecurity problem. By bringing technical infrastructure into the epistemic realm of disinformation, this paper shifts policy conversations around content moderation to encompass stronger cybersecurity architectures.
Disinformation and Identity-Based Violence
Disinformation spread via digital technologies is accelerating and exacerbating violence globally. There is an urgency to understand how coordinated disinformation campaigns rely on identity-based disinformation that weaponizes racism, sexism, and xenophobia to incite violence against individuals and marginalized communities, stifle social movements, and silence the press.
The purposeful spread and amplification of identity-based disinformation is not just an individual expression of individual bias but instead represents the systematic weaponization of discrimination to make hateful narratives go viral. At the core of identity-based disinformation is the exploitation of individuals’ or groups’ senses of identity, belonging, and social standing.
Responding to identity-based disinformation will require technical and human responses that are collaborative, locally relevant, and community-driven. Given the extent of the harms posed by identity-based disinformation, there is a continued need to develop, implement, and improve responses.
Exporting Autocracy: How Foreign Influence Operations Shape Democratic Attitudes
What impact do foreign authoritarian influence operations (FIOs) have on democracy? By some measures, nearly all the hard-won democratic gains from the previous 35 years had disappeared by 2022 (Varieties of Democracy 2023). Since these declines corresponded with a steep increase in disinformation, numerous scholars argue that FIOs contributed to these democratic setbacks (Diamond 2019; Dobson, Masoud, and Walker 2023). Other research has questioned the evidence of such backsliding (Little and Meng 2024; Arriola, Rakner, and Van de Walle 2023), or claimed more generally that information campaigns have only marginal political effects (Eady, Paskhalis, Zilinsky et al. 2023). Through an examination of democratic attitudes in 15 African countries between 2009 and 2023, we present preliminary but compelling evidence that autocrats export authoritarianism.
Misinformed about Misinformation: On the polarizing discourse on misinformation and its consequences for the field
For almost a decade, the study of misinformation has taken priority among policy circles, political elites, academic institutions, non-profit organizations, and the media. Substantial resources have been dedicated to identifying its effects, how and why it spreads, and how to mitigate its harm. Yet, despite these efforts, it can sometimes feel as if the field is no closer to answering basic questions about misinformation’s real-world impacts, such as its effects on elections or links to extremism and radicalization.
Mythical Beasts and Where to Find Them
Despite its contribution to human rights harms and national security risks, the proliferation of spyware remains rife. A significant channel for this proliferation is sale through a global market, of which most public information is known about only a handful of vendors. While some of these entities have achieved infamy, like NSO Group and the Intellexa Consortium, most others have largely flown under the radar.
The Mythical Beasts project addresses this meaningful gap in contemporary public analysis on spyware proliferation, pulling back the curtain on the connections between 435 entities across forty-two countries in the global spyware market. These vendors exist in a web of relationships with investors, holding companies, partners, and individuals often domiciled in different jurisdictions.
Book Review Fight for the Final Frontier: Irregular Warfare in Space
A seasoned scholar, strategist, and expert in space policy and strategy, Dr. John J. Klein is well-versed in applying strategic theory to the space domain. In his new book, Fight for the Final Frontier: Irregular Warfare in Space (2023), Klein argues that irregular warfare, in both its military and nonmilitary forms, is a vital and underutilized concept for understanding malicious activities in space and the nature of space warfare. His argument draws on a diverse list of strategic theorists, historians, and contemporary policy analyses. Klein weaves these sources together persuasively, providing an accessible overview of a technologically demanding subject. Policy generalists and students, along with veteran analysts of space policy, will benefit from his account.
Book Review - Cyber Threats & Nuclear Weapons
As the world’s infrastructure becomes increasingly interconnected, more critical systems are exposed to cyber threats. A cyber threat is a malicious act intended to steal, damage, or disrupt digital data. Cyber threats seek to turn potential security vulnerabilities into attacks on systems and networks.
Markets Matter - A Glance into the Spyware Industry
The Intellexa Consortium, a complex web of holding companies and vendors for spyware and related services, have been the subject of recent, extensive sanctions by the US Department of the Treasury and the focus of reporting by the European Investigative Collaborations among others. The Consortium represents a compelling example of spyware vendors in the context of the market in which they operate—one which helps facilitate the commercial sale of software driving both human rights and national security risk. This paper addresses an international policy effort among US partners and allies, led by the French and British governments, as well as a surge of US policy attention to address the proliferation of this spyware.
Small Satellites and International Security
Orbiting satellites perform many tasks: communications, broadcasting, weather forecasting, earth observation, intelligence-gathering, and scientific research. The first satellite, launched in 1957, was a modest metal sphere containing a simple radio transmitter. Since then, satellites have grown in size and complexity. Many are visible to anyone with a reasonably powerful backyard telescope.
New Technology and Nuclear Risk
In 2006, two leading scholars of the nuclear era warned that the age of mutually assured destruction (MAD) was ending. Seventeen years later, the authors are doubling down on these claims, arguing that the outbreak of new conventional conflicts has changed nuclear decision making, increasing the threat of coercive nuclear escalation. In an age of new technology, this warning is more pertinent than ever. The rapid introduction of emerging technologies and their weaponization raises concerns about maintaining strategic stability.